A zero-day remote code execution (RCE) vulnerability has come to light in the Spring framework shortly after a Chinese security researcher briefly leaked a proof-of-concept (PoC) exploit on GitHub before deleting their account. According to cybersecurity firm Praetorian, the unpatched flaw impacts Spring Core on Java Development Kit (JDK) versions 9 and later and is
Technology
Vivo Pad and Vivo Watch are reportedly being tested in India, with a launch expected by the end of Q2 or early Q3 this year. Vivo Pad is set to be the first tablet launched by the Chinese tech giant in India. The report, however, does not specify whether the Vivo Watch arriving in India
A nascent information stealer called Mars has been observed in campaigns that take advantage of cracked versions of the malware to steal information stored in web browsers and cryptocurrency wallets. “Mars Stealer is being distributed via social engineering techniques, malspam campaigns, malicious software cracks, and keygens,” Morphisec malware researcher Arnold Osipov said in a report
WhatsApp on Wednesday announced a series of updates for voice messages to make it easier for people to communicate with their contacts on the platform using voice notes. The updates include features such as the ability to pause and resume voice message recordings, waveform visualisation, out of chat playback, and draft preview that were already
A duo of researchers has released a proof-of-concept (PoC) demonstrating the ability for a malicious actor to remote lock, unlock, and even start Honda and Acura vehicles by means of what’s called a replay attack. The attack is made possible, thanks to a vulnerability in its remote keyless system (CVE-2022-27254) that affects Honda Civic LX,
OnePlus 10R design has been suggested through a series of renders that have surfaced online. The new OnePlus phone is speculated to debut in May. The renders indicate that the OnePlus 10R would come with features including a hole-punch display design. The smartphone is rumoured to be a rebadged Realme GT Neo 3 that was
According to a leading figure in the defense community, a retired general who prefers to remain anonymous, space can save us from the next Ukraine. Here’s how. Says the general, “Imagine this. At 7:00 AM, Russia moves troops across the border into Ukraine. Fifteen minutes later a pre-loaded SpaceX starship lifts off with a payload
A threat actor of likely Pakistani origin has been attributed to yet another campaign designed to backdoor targets of interest with a Windows-based remote access trojan named CrimsonRAT since at least June 2021. “Transparent Tribe has been a highly active APT group in the Indian subcontinent,” Cisco Talos researchers said in an analysis shared with
If you’re obsessed with phone specifications and are looking for the best combination of components you can get without spending a huge amount, chances are you’ve spent some time looking up Xiaomi’s Redmi Note and Redmi Note Pro models. The company made its mark in India by selling low-cost phones, but the Redmi Note series
A group of academics has designed a new system known as “Privid” that enables video analytics in a privacy-preserving manner to combat concerns with invasive tracking. “We’re at a stage right now where cameras are practically ubiquitous. If there’s a camera on every street corner, every place you go, and if someone could actually process
Redmi 10A has quietly been launched as the latest affordable phone in the Redmi 10 series. The new Redmi phone is the successor to the Redmi 9A that was launched back in 2020. The Redmi 10A has a list of similarities with the Redmi 9A. Those include the same MediaTek Helio G25 SoC as well
A new email phishing campaign has been spotted leveraging the tactic of conversation hijacking to deliver the IceID info-stealing malware onto infected machines by making use of unpatched and publicly-exposed Microsoft Exchange servers. “The emails use a social engineering technique of conversation hijacking (also known as thread hijacking),” Israeli company Intezer said in a report
Xiaomi Mi Mix Fold 2 will get a cover display of 6.5 inches and the size of its internal display will be 8 inches, according to a noted tipster. The second foldable phone from Xiaomi is also said to come with an improved crease on the internal screen. Furthermore, the information about the specifications and
The operators of the Purple Fox malware have retooled their malware arsenal with a new variant of a remote access trojan called FatalRAT, while also simultaneously upgrading their evasion mechanisms to bypass security software. “Users’ machines are targeted via trojanized software packages masquerading as legitimate application installers,” Trend Micro researchers said in a report published
Vivo X Fold launch date has been set for April 11 in China, Vivo has announced via a post on Weibo. The Chinese company has also shared a teaser image and a short clip of its first foldable phone. Apart from the foldable phone, Vivo has also revealed the design and colour options of the
The City of London Police has arrested seven teenagers between the ages of 16 and 21 for their alleged connections to the prolific LAPSUS$ extortion gang that’s linked to a recent burst of attacks targeting NVIDIA, Samsung, Ubisoft, LG, Microsoft, and Okta. The development, which was first disclosed by BBC News, comes after a report
New State Mobile (formerly PUBG New State) recently released its March update for Android and iOS that brought the McLaren 765LT supercar to the game. This update also introduced a new location to the Erangel 2051 map. To celebrate this change, Krafton has launched the Play Erangel 2051 event. The event adds two limited-time challenges
Google on Friday shipped an out-of-band security update to address a high severity vulnerability in its Chrome browser that it said is being actively exploited in the wild. Tracked as CVE-2022-1096, the zero-day flaw relates to a type confusion vulnerability in the V8 JavaScript engine. An anonymous researcher has been credited with reporting the bug
Switching to a new smartphone can be a tedious affair — copying your data from the old phone, setting up, and logging into apps is part of the process. If you are planning to give up your old smartphone as part of an exchange offer, or you are passing it to another family member or
A Chinese-speaking threat actor called Scarab has been linked to a custom backdoor dubbed HeaderTip as part of a campaign targeting Ukraine since Russia embarked on an invasion last month, making it the second China-based hacking group after Mustang Panda to capitalize on the conflict. “The malicious activity represents one of the first public examples